Today Microsoft released the following Security Bulletins. 13-4-04]

Today Microsoft released the following Security Bulletins.
Posted originally by Jerry Bryant - Microsoft IT Communitieshttp://snipurl.com/5om6
Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the Microsoft.com download center or Windows Update. See the individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

Re-Released Bulletins:
The following bulletins have been re-released to advise of the availability of updates for various versions of Microsoft Exchange Server. Please see the bottom of each bulletin for revision information.

This represents our regularly scheduled monthly bulletin release (second Tuesday of each month). Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety (1-866-727-233. International customers should contact their local subsidiary.

The DeepSight Threat Analyst team has raised the ThreatCon to level 2. Symantec's ThreatCon Rating provides an overall view of global Internet Security and is based on a 1-4 rating system, with a level 4 being the highest threat level.

Network administrators are strongly advised to audit their controlled systems that these issues may affect, and also apply necessary updates. The Symantec Security Response team believes that the creation of Internet worms that take advantage of some of these vulnerabilities is possible and recommends that the risks be mitigated as soon as possible.